Administering Microsoft SQL Server course description This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on how to use SQL Server 2016 product features and tools related to maintaining a database. Note: This course is designed for customers who are interested in learning SQL Server 2014 or SQL Server 2016. It covers the new features in SQL Server 2016, but also the important capabilities across the SQL Server data platform. What will you learn Describe core database administration tasks and tools. Configure SQL Server databases and storage. Import and export data. Monitor SQL Server. Trace SQL Server activity. Manage SQL Server security. Audit data access and encrypt data. Administering Microsoft SQL Server course details Who will benefit: Individuals who work with SQL Server databases. Individuals who develop applications that deliver content from SQL Server databases. Prerequisites: Introduction to data communications & networking. Duration 3 days Administering Microsoft SQL Server course contents Introduction to SQL Server administration Database administration, SQL Server platform, database management tools and techniques. Hands on SQL Server Management Studio, sqlcmd Windows PowerShell with SQL Server. Working with databases and storage Data storage with SQL Server, managing storage for system databases, managing storage for user databases, moving database files, configuring the buffer pool extension. Hands on Configuring tempdb storage, creating databases, attaching a database. Importing and exporting data Transferring data, importing and exporting table data, copying or moving a database. Hands on import and export wizard, bcp utility, BULK INSERT statement, OPENROWSET function. Monitoring SQL Server 2014 Monitoring SQL Server, dynamic management views and functions, performance monitor. Hands on Baseline metrics, monitoring a workload. Tracing SQL Server activity Tracing workload activity, using traces. Hands on Capturing a trace in SQL Server profiler, generating tuning recommendations. Managing SQL Server security SQL Server security, server-level security, database-level principals, database permissions. Hands on SQL Server security. Testing access.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Get a clear strategy for bouncing back after a poor Ofsted inspection outcome; develop your DfE action plan; know what to expect from a progress monitoring inspection.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
ITIL® 4 Specialist: High Velocity IT: In-House Training The ITIL® 4 Specialist: High-Velocity IT module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: High-Velocity IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This module addresses the specifics of digital transformation and helps organizations to evolve towards a convergence of business and technology, or to establish a new digital organization. It was designed to enable practitioners to explore the ways in which digital organizations and digital operating models function in high-velocity environments. Working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing are included. What You Will Learn At the end of this course, participants will be able to: Understand concepts regarding the high-velocity nature of the digital enterprise, including the demand it places on IT. Understand the digital product lifecycle in terms of the ITIL operating model. Understand the importance of the ITIL guiding principles and other fundamental concepts for delivering high-velocity IT. Know how to contribute to achieving value with digital products. Course Introduction Let's Get to Know Each Other Course Learning Objectives Target Audience Characteristics ITIL® 4 Certification Scheme Course Components Course Agenda Module-End Exercises Exam Details Introduction to High-Velocity IT High-Velocity IT Digital Technology Digital Organizations Digital Transformation High-Velocity IT Approaches Relevance of High-Velocity IT Approaches High-Velocity IT Approaches in Detail High-Velocity IT Operating Models Introduction ITIL® Perspective High-Velocity IT Aspects High-Velocity IT Applications ITIL® Building Blocks for High-Velocity IT Digital Product Lifecycle Service Value Streams Four Dimensions of Service Management ITIL® Management Practices High-Velocity IT Culture Key Behavior Patterns ITIL® Guiding Principles Supporting Models and Concepts for Purpose Ethics Design Thinking Supporting Models and Concepts for People Reconstructing for Service Agility Safety Culture Stress Prevention Supporting Models and Concepts for Progress Working in Complex Environments Lean Culture ITIL® Continual Improvement Model High-Velocity IT Objectives and Techniques High-Velocity IT Objectives High-Velocity IT Techniques Techniques for Valuable Investments Prioritization Techniques Minimum Viable Products and Services Product / Service Ownership A/B Testing Techniques for Fast Developments Basic Concepts Related to Fast Development Infrastructure as Code Reviews Continual Business Analysis Continuous Integration / Continuous Delivery (CI/CD) Continuous Testing Kanban Techniques for Resilient Operations Introduction to Resilient Operations Technical Debt Chaos Engineering Definition of Done Version Control Algorithmic IT Operations ChatOps Site Reliability Engineering (SRE) Techniques for Co-created Value Basic Concepts of Co-created Value Service Experience Techniques for Assured Conformance DevOps Audit Defense Toolkit DevSecOpsPeer Review
About this Course Batteries are going to play an increasingly important role in the energy grid. An increasing number of developers are looking to add battery storage systems (BESS) into their existing projects. However future cash flows are highly uncertain and they are often unsure exactly how battery technology can be monetised. A strong revenue model requires stacking of different revenue sources. As the share of variable renewable sources in electricity systems further increase, battery systems are expected to play a growing role by providing frequency control and operational reserves as well as for wholesale arbitrage, while helping reduce grid integration costs. The more volatile electricity prices are, the greater the earning potential of batteries trading electricity on various electricity markets. BESS can generate revenue streams in several different ways; through a frequency response contract with the TSO, by providing grid services in other ways or by arbitrage through buying cheap power and selling power for a higher price in a liquid wholesale market. Because batteries are efficient, the round trip efficiency is also high. They can spread arbitrage trading much better than other storage types and in many cases, other asset classes. For companies that combine a battery with other tasks, for example to store power from their own panels, or to avoid a costly heavy power connection, the investment is less risky than for those that purely focus on arbitrage trading. It is uncertain whether electricity prices will fluctuate more violently in the coming years, or whether the peaks will actually level off. During this highly interactive training, the trainer will provide you with the latest insights and best practices on how to obtain the maximum economic beneï¬ts when participating with BESS in the electricity market. Training Objectives By the end of this course, the participants will be able to: Discover the different BESS battery technologies and their impact on the grid Understand the role of storage in providing flexibility to the power system Examine the potential revenue streams from BESS models Learn how profit can generated with BESS trading strategies Determine how to optimize the value from BESS projects Find out how to combine BESS with renewable PPAs Target Audience Professionals and executives from Power Utilities, Energy Companies, Financial & Investment Banks, Renewable Power Project Developers, Transmission System Operators and Energy Industry Regulators will find this training course useful. Electricity Marketing and Traders New Venture or Business Development Executives Corporate Finance and Treasury Executives Audit and Risk Management Executives Power or Utility Market Research Analysts Investment Managers for Renewable Power Projects Origination Professionals Regulation, Compliance and Documentation Officers Lawyers and Accountants Power Transmission and Distributions Engineers Trainer Our key expert is a skilled and accomplished professional with over 25 years' of extensive senior management / board level experience in the energy markets worldwide. Next to advising energy companies, banks, consultants and regulators regarding PPAs, our key expert has also conducted several highly successful training courses about Power Purchase Agreements, Power Project Finance, IPPs, and Project Risk Management to over 1,000 high level participants from Asia, Africa, Europe and Middle East. He was a member of the expert commission of the Dutch Government for 2 offshore wind parks, Hollandse Kust (zuid) Wind Farm Zone Sites 3 and 4 that advised on which of the 5 applicants did provide the best security and solutions associated with the electricity and green certificate prices, the construction and operational risks of the project. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Training Course This interactive training course and workshop session is developed to provide a catalyst for transformation of the legacy systems and adapting to the upcoming trends in the near future in the LPG supply chain. The course curriculum is based on overcoming the challenges of cost and quality enhancement. Both challenges encompass critical review of each aspect from production to transportation with safety of operations and zero loss of energy, thereby enhancing revenue. Training Objectives This course is developed to meet the needs LPG producers, Gas Tankers and Terminals operators, and fraternity of stakeholders, with the following underlying objectives: Conduct assessment of current standards and management systems in context of market forces and economics of demand and supply; Explore impact of emerging markets and user segments of LPG transiting from oil or electricity use; Identify avenues in need of production process review for enhancing the quality in terms of energy content of LPG; Evaluate current and future trends in LPG transportation and the influence of regulatory regimes and incentive schemes, for investment in Storage Terminals and distribution networks; Identify the operations and protocols to be adaptable for compliance with new regulations and trends; Establish transportation and distribution cost control mechanism at optimum level; and Develop guidelines and SOPs for contamination free transfer, loading and discharging of LPG Tankers. Target Audience This is a 'must attend' course if you are a: LPG Gas Producer Process Specialist Buyer Trader LPG Tanker Owner Charterer, and Management personnel holding responsible positions such as Director, General Manager, Commercial Manager, Business Development Manager, Legal Counsel, Post-Fixtures Manager, Fleet Manager, Marine & Technical Superintendent, Senior Engineer or Middle Level Manager as part of succession planning. Training Methods The course will be delivered in 3 full-day sessions comprising 8 hours per day. Course Duration: 3 full-day sessions, 8 hours per session (24 hours in total). Trainer Principal Management Consultant FAIADR, FACICA, FHKIoD, M.S.I.D, Member, AIPN LL.M. (IP Laws), M. Sc. (Maritime Studies) M, Tech (Knowledge Engineering), MBA First Class CoC (DOT, UK), B. E. (Elect) Your expert course leader, during the last 45 year period, has worked and consulted in the industry verticals encompassing: Marine, Shipping & Transport, Technology, Oil & Gas Exploration & Production, Petrochemical Process Plants and Power Plant Construction Projects, Logistics & Warehousing, Offshore, Oil & Gas Pipelines, Infrastructure Development Projects (Construction, Ports, Offshore Supply Bases, Oil & Gas Terminals and Airports etcetera), EPCIC Contracts, and Shipyards, in South East Asia, Africa, Middle East, Americas and Europe. He is a Principal Management Consultant in a consulting company in Hong Kong and Singapore, specializing in the fields of corporate management consultancy, international contracts reviews and alternative dispute resolutions services. He has been frequently engaged for assignments like due diligence, acquisitions, and mergers. The assignments often involved resolving various operational issues, contracts reviews, cost controls, project management matters and enhancement of international procurement and Supply Chain Management systems. He continues to be actively engaged in advisory services for Remuneration, Audit and Risk Management Committees of public companies as well as MNCs. He has developed a special initiative for conducting audits of ERM Systems (Enterprise Risk Management) and valuation of intangible properties involving proprietary processes (IP), licensed production and intellectual property rights. He graduated with a Bachelor's degree in Electrical Engineering, MBA in General Management, Master of Technology in Knowledge Engineering, Master of Science in Maritime Studies and LL.M. (IP Law). He also holds professional qualifications in arbitration, contracts laws, and marine engineering, including the Chief Engineer's First-Class Certificate of Competency (DOT, UK). He has been Associate, SIM University (SUSS) Singapore and taught on subjects including Business Continuity Planning and Risk Management. He has served as Director and member of Board of Management, Governance Councils and Risk Management Committees of international organizations. He is admitted to various professional institutions as: 'Fellow', Australian Centre for International Commercial Arbitration (FACICA); Asian Institute of ADR (FAIADR), Malaysia; Hong Kong Institute of Directors (FHKIoD), Member, Singapore Institute of Directors (M.S.I.D.), and Member, Association of International Petroleum Negotiators (AIPN) USA. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
A workshop for independent schools that are inspected by Ofsted. Providing a proven strategy for ensuring compliance with the independent school standards.
Overview Internal control, as defined by accounting and auditing, is a process for assuring an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. It is very important for the organisation to have a smooth flow of accounting as it plays a very important role in the development of the organisation. Financial Managers or any person who deals with Accounts need to see that the company accounts are very updated and are free from any risks that can become a problem during the time of Auditing. This course will feed you with all the skills required to have a good Internal Management process it is important to analyse Risk Management to see if the process is working efficiently and measures the effectiveness of controls put in place to alleviate risks.
About this Training Course The industry is surrounded with examples of poor Turnarounds, which have injured people and damaged businesses. If Turnarounds are not properly planned, managed and controlled, companies run the risks of serious safety and budget penalties, costly schedule delays and negative impacts on customers. As a consequence, operators are starting to explore Turnaround best practices and establish a more robust methodology. Turnarounds are the highest risk activity that we routinely perform in the industry, but they are also an area of massive variability in approach and outcome. Central to the variability is a lack of written methodologies and training - there are around 1,000 times as many books on maintenance as there are on turnaround management. All too often companies see Turnarounds as something to be survived and therefore it is no surprise that most Turnarounds fail. This 4 full-day course is based upon the Carcharodon 'Best of the Best' model of excellence for shutdown management with inputs from people who have done it from the trenches along with some of the world's most experienced shutdown specialists. All this experience has been condensed into a core methodology - our blueprint for success. It converts Turnarounds from a high-risk nuisance to a business opportunity. It has been used on multiple sites around the world, has been the basis of two books and is also supplemented by a roadmap for building and controlling a successful Turnaround. This is a certificate course where participants will have the option to participate for a short exam on the final day of the course to gain a Certificate in Advanced Turnaround, Shutdown & Outage Management from petroEDGE and the Academy of Turnarounds Operations and Maintenance. The purpose of this course is to equip the participants on the use of the Model of Excellence for Turnarounds and the principles of Challenge Planning to equip attendees with an advanced approach to Turnaround Management. The course is backed by real situations, high levels of interaction, group exercises and multiple case studies. It will explore the underlying mechanisms and levers that shape a Turnaround to demonstrate why we sometimes succeed or fail and introduce new conceptual approaches that can increase our chances of succeeding. Training Objectives Upon completion of this course, the participants will be able to: Position Turnarounds as part of an overall strategy of improving business performance. Build the best Turnaround team possible from available resources. Help senior management build effective steering teams. Reduce the downtime associated with turnarounds while simultaneously improving safety performance. Use the Model of Excellence to analyse their own performance, explain key principles to others and build a detailed methodology of their own. Maximise the benefits of planning and preparation through a proactive challenge planning process where the participants will build a Turnaround from the ground up from concept to execution and review. Target Audience This course has been researched and developed for Experienced Managers, Superintendents, Supervisors, Engineers, Planners, Team Leaders and Coordinators of: Shutdowns/Turnarounds Maintenance Engineering Reliability Plant Outage Asset Management Operations/Audit Safety Course Level Basic or Foundation Trainer Your expert course leader is a highly experienced facilitator in maintenance improvement, change management, continuous improvement and capability development as a management coach and trainer. He has a strong focus on people with an emphasis on developing people and the practicalities of improving maintenance performance rather than just the theory. He has worked internationally across Europe, America, the Middle East and Africa with extensive experience in Oil and Gas, the Chemicals sector and manufacturing as well as working with clients in Steel and Power Generation. As a result, he can bring best practice from a wide variety of sources. He spent the first fifteen years of his career as a specialist trainer working for companies such as Lloyds British Training Services and Rolls Royce. He then went on to work as a Principal consultant for ABB consulting for 15 years. During this time, he refined some of the established improvement tools including how and when to apply them for maximum impact whilst still continuing to develop and deliver training in support of this. Recent work has included improvements to the Work Order to Work Execution processes of Engineering departments and focused on Reliability, Planning and Scheduling. This ongoing field experience has helped him test and refine specialist training in a number of areas. He has been able to use his own experience to contribute with other maintenance specialists to the Carcharodon models of excellence. Its methodologies are recognised as 'Best of the Best' standards providing the inspiration for two books, projects that have won awards such as the prodigious UK Chemical Industries annual Excellence in Engineering award and form the basis of this training. He was recently awarded a national award as coach of the year. He uses the same skills to ensure that he does not just preach maintenance best practice, he discusses it, explains it and ensures that delegates have a much more personal and flexible experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations